How Practical is Homomorphically Encrypted Program Execution? An Implementation and Performance Evaluation
M. Brenner, H. Perl, and M. Smith. Trust, Security and Privacy in Computing and Communications (TrustCom), 2012 IEEE 11th International Conference on, page 375 -382. (June 2012)
DOI: 10.1109/TrustCom.2012.174
%0 Conference Paper
%1 6295998
%A Brenner, M.
%A Perl, H.
%A Smith, M.
%B Trust, Security and Privacy in Computing and Communications (TrustCom), 2012 IEEE 11th International Conference on
%D 2012
%K myown
%P 375 -382
%R 10.1109/TrustCom.2012.174
%T How Practical is Homomorphically Encrypted Program Execution? An Implementation and Performance Evaluation
@inproceedings{6295998,
added-at = {2012-11-12T18:06:27.000+0100},
author = {Brenner, M. and Perl, H. and Smith, M.},
biburl = {https://www.bibsonomy.org/bibtex/2cae6474ae848eabced7173f8a735ad42/michaelbrenner},
booktitle = {Trust, Security and Privacy in Computing and Communications (TrustCom), 2012 IEEE 11th International Conference on},
doi = {10.1109/TrustCom.2012.174},
interhash = {78035a92160b64bff4190ff3eaf42604},
intrahash = {cae6474ae848eabced7173f8a735ad42},
keywords = {myown},
month = {june},
pages = {375 -382},
timestamp = {2012-11-12T18:06:27.000+0100},
title = {How Practical is Homomorphically Encrypted Program Execution? An Implementation and Performance Evaluation},
year = 2012
}